Skip to content

Commit b74e8bb

Browse files
authored
Merge branch 'main' into graph-api
2 parents 097bc1e + ebf668b commit b74e8bb

25 files changed

+316
-118
lines changed

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 46 additions & 45 deletions
Large diffs are not rendered by default.

CloudAppSecurityDocs/app-governance-app-policies-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: Get started learning about app governance policies with Microsoft D
77

88
# Get started with app policies
99

10-
Policies for app governance are a way to implement proactive and reactive alerts and automatic remediation for your specific needs for app compliance in your organization. You can create policies in app governance to manage OAuth apps in Microsoft Entra ID, Google and Salesforce.
10+
Policies for app governance are a way to implement proactive and reactive alerts and automatic remediation for your specific needs for app compliance in your organization. You can create policies in app governance to manage OAuth apps in Microsoft 365, Google and Salesforce.
1111

1212
There are two types of policies in app governance:
1313

CloudAppSecurityDocs/app-governance-app-policies-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ description: Manage your app governance policies.
77

88
# Manage app policies
99

10-
Use app governance to manage OAuth policies for Microsoft Entra ID, Google Workspace, and Salesforce.
10+
Use app governance to manage OAuth policies for Microsoft 365, Google Workspace, and Salesforce.
1111

1212
You might need to manage your app policies as follows to keep up-to-date with your organization's apps, respond to new app-based attacks, and for ongoing changes to your app compliance needs:
1313

1414
- Create new policies targeted at new apps
1515
- Change the status of an existing policy (active, inactive, audit mode)
1616
- Change the conditions of an existing policy
17-
- Change the actions of an existing policy for autoremediation of alerts
17+
- Change the actions of an existing policy for auto-remediation of alerts
1818

1919
<a name='manage-oauth-app-policies-for-azure-ad'></a>
2020

CloudAppSecurityDocs/app-governance-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Before you start, verify that you satisfy the following prerequisites:
1717

1818
- Microsoft Defender for Cloud Apps must be present in your account as either a standalone product or as part of the various [license](#licensing) packages.
1919

20-
If you aren't already a Defender for Cloud Apps customer, you can [sign up for a free trial](https://www.microsoft.com/security/business/cloud-apps-defender).
20+
If you aren't already a Defender for Cloud Apps customer, you can [sign up for a free trial](https://www.microsoft.com/security/business/cloud-apps-defender).
2121

2222
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
2323

CloudAppSecurityDocs/app-governance-visibility-insights-compliance-posture.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,41 +19,41 @@ The **Overview** page shows the following details:
1919
For example:
2020

2121
> [!div class="mx-imgBorder"]
22-
>![Relative number of detected and policy-based incidents.](incidents-summary1.png)
23-
>
22+
> ![Relative number of detected and policy-based incidents.](incidents-summary1.png)
23+
>
2424
> [!div class="mx-imgBorder"]
25-
>![top alerts.](media/app-governance-visibility-insights-compliance-posture/top-alerts.png)
25+
> ![top alerts.](media/app-governance-visibility-insights-compliance-posture/top-alerts.png)
2626
2727
## Data usage cards
2828

2929
Data usage cards show the following types of information:
3030

31-
- **Total data accessed by apps** in the tenant through Graph API over the current month and previous three calendar months. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Graph API)
31+
- **Total data accessed by apps** in the tenant through Microsoft Graph and EWS APIs over the current month and previous three calendar months. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Microsoft Graph and EWS APIs)
3232

33-
- **Data usage over the current month and previous three calendar months**, broken down by resource type. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Graph API)
33+
- **Data usage over the current month and previous three calendar months**, broken down by resource type. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Microsoft Graph and EWS APIs)
3434

3535
For example:
3636

3737
> [!div class="mx-imgBorder"]
38-
>![Total data accessed by apps.](media/app-governance-visibility-insights-compliance-posture/data-usage-chart.png)
38+
> ![Total data accessed by apps.](media/app-governance-visibility-insights-compliance-posture/data-usage-chart.png)
3939
4040
## Apps that access data on Microsoft 365
4141

42-
For apps that access data on Microsoft 365, cards show the number of apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days
42+
For apps that access data on Microsoft 365, cards show the number of apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams using Microsoft Graph and EWS APIs in the last 30 days.
4343

4444
For example:
4545

4646
> [!div class="mx-imgBorder"]
47-
>![Apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days.](media/app-governance-visibility-insights-compliance-posture/apps-accessed-m365-services-chart.png)
47+
> ![Apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days.](media/app-governance-visibility-insights-compliance-posture/apps-accessed-m365-services-chart.png)
4848
4949
## Sensitivity labels accessed
5050

51-
For sensitivity labeling data, cards show the number apps that have accessed content with sensitivity labels on SharePoint, OneDrive, Exchange Online or Teams in the last 30 days.
51+
For sensitivity labeling data, cards show the number apps that have accessed content with sensitivity labels on SharePoint, OneDrive, Exchange Online or Teams using Microsoft Graph and EWS APIs in the last 30 days.
5252

5353
For example:
5454

5555
> [!div class="mx-imgBorder"]
56-
>![number apps that have accessed content with sensitivity labels.](sensitive-data-accessed-chart1.png)
56+
> ![number apps that have accessed content with sensitivity labels.](sensitive-data-accessed-chart1.png)
5757
5858
## Next steps
5959

CloudAppSecurityDocs/app-governance-visibility-insights-get-started.md

Lines changed: 37 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -38,32 +38,48 @@ One of the primary value points for app governance is the ability to quickly vie
3838
1. On the **App governance** page, select one of the apps tabs to display your apps.
3939

4040
The apps listed depend on the apps present in your tenant.
41-
41+
4242
1. Filter the apps listed using one or more of the following default filter options:
4343

44-
- **API access**
45-
- **Privilege level**
46-
- **Permission usage**
47-
- **Permission type**
48-
- **Publisher verified**
49-
44+
- **API access**
45+
46+
- **Privilege level**
47+
48+
- **Permission** (Preview)
49+
50+
- **Permission usage**
51+
52+
- **App origin**
53+
54+
- **Permission type**
55+
56+
- **Publisher verified**
57+
5058
Use one of the following nondefault filters to further customize the apps listed:
51-
52-
- **Last modified**
53-
- **Added on**
54-
- **Certification**
55-
- **Users**
56-
- **Services accessed**
57-
- **Data usage**
58-
- **Sensitivity labels accessed**
59-
60-
> [!TIP]
61-
> Save the query to save the currently selected filters for use again in the future.
62-
59+
60+
- **Last modified**
61+
62+
- **Added on**
63+
64+
- **Certification**
65+
66+
- **Users**
67+
68+
- **Services accessed**
69+
70+
- **Data usage**
71+
72+
- **Sensitivity labels accessed**
73+
74+
> [!TIP]
75+
> Save the query to save the currently selected filters for use again in the future.
76+
6377
1. Select the name of an app to view more details. For example:
6478

65-
:::image type="content" source="media/app-governance-visibility-insights-get-started/image2.png" alt-text="Screenshot of an app details pane showing an app summary.":::
66-
79+
![Screenshot of an app details pane showing an app summary.](media/app-governance-visibility-insights-get-started/app-governance-app-list-view.png)
80+
81+
82+
6783
The details pane lists the app usage over the past 30 days, the users who have consented to the app, and the permissions assigned to the app.
6884

6985
For example, an administrator might review the activity and permissions of an app that is generating alerts and make a decision to disable the app using the **Disable App** button towards the bottom of the app details pane.

CloudAppSecurityDocs/app-governance-visibility-insights-view-apps.md

Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -17,21 +17,21 @@ For a summary of apps in your tenant, in Microsoft 365, go to **Cloud app > App
1717

1818
For example:
1919

20-
:::image type="content" source="media/app-governance-visibility-insights-view-apps/appg-cc-apps.png" alt-text="Screenshot of the Azure AD apps tab on the App governance page.":::
21-
20+
:::image type="content" source="media/app-governance-visibility-insights-view-apps/app-governance-app-list-view-new.png" alt-text="Screenshot of the Azure AD apps tab on the App governance page.":::
2221

2322
>[!NOTE]
2423
> Your sign-in account must have one of [these roles](app-governance-get-started.md#roles) to view any app governance data.
2524
>
2625
27-
On the **Azure AD apps** tab, the apps in your tenant are listed with the following details:
26+
On the **Microsoft 365** tab, the apps in your tenant are listed with the following details:
2827

2928
|Column name |Description |
3029
|---------|---------|
31-
|**App name** | The display name of the app as registered on Microsoft Entra ID |
32-
|**App status** | Shows whether the app is enabled or disabled, and if disabled by whom |
30+
| **App name** | The display name of the app as registered on Microsoft Entra ID |
31+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom |
3332
| **Graph API access**| Shows whether the app has at least one Graph API permission |
3433
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions |
34+
| **App origin** (Preview)| Shows whether the app originated within the tenant or was registered in an external tenant |
3535
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app |
3636
| **Publisher**| Publisher of the app and their verification status |
3737
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
@@ -55,13 +55,13 @@ You can also select **Search** to search for an app by name.
5555

5656
Select a specific app in the grid to view more details on an apps details pane on the right. For example:
5757

58-
:::image type="content" source="media/app-governance-visibility-insights-view-apps/image2.png" alt-text="Screenshot of an app details pane on the Azure AD tab.":::
58+
:::image type="content" source="media/app-governance-visibility-insights-view-apps/app-governance-app-list-view.png" alt-text="Screenshot of an app details pane on the Azure AD tab.":::
5959

60-
The **Summary** tab also shows more data about the app, such as the date first consented and the App ID. To see the properties of the app as registered in Microsoft Entra ID, select **View app in Azure AD**.
60+
The **Summary** tab also shows more data about the app, such as the date first consented and the App ID. To see the properties of the app as registered in Microsoft Entra ID, select **View in Microsoft Entra ID**.
6161

6262
In the details pane, select any of the following tabs to view more details:
6363

64-
- Select the **Data usage** tab to view a graph of data usage over time, for Exchange, SharePoint, OneDrive, and Teams resources. For example:
64+
- Select the **Data usage** tab to view a graph of data usage over time, for Exchange, SharePoint, OneDrive, and Teams resources via Microsoft Graph and EWS APIs. For example:
6565

6666
:::image type="content" source="media/app-governance-visibility-insights-view-apps/data-usage.png" alt-text="Screenshot of the Data usage tab.":::
6767

@@ -73,7 +73,7 @@ In the details pane, select any of the following tabs to view more details:
7373

7474
If an app is *admin consented*, the **Total consented users** are all users in the tenant.
7575

76-
- Select the **Permissions** tab to see a summary and list of the Graph API and legacy permissions granted to the app, consent type, and whether they are in use. For example:
76+
- Select the **Permissions** tab to see a summary and list of the Graph API and legacy permissions granted to the app, consent type, privilege level and whether they are in use. For example:
7777

7878
:::image type="content" source="media/app-governance-visibility-insights-view-apps/permissions.png" alt-text="Screenshot of the Permissions tab.":::
7979

@@ -83,13 +83,8 @@ In the details pane, select any of the following tabs to view more details:
8383

8484
:::image type="content" source="media/app-governance-visibility-insights-view-apps/sensitive-labels-details.png" alt-text="Screenshot of the Sensitivity labels tab.":::
8585

86-
For an enabled app, there's also a **Disable app** control to disable the use of the selected app and an **Enable app** control to enable the use of the disabled app. These actions require at least the following administrator roles:
87-
86+
For an enabled app, there's also a **Disable app** control to disable the use of the selected app and an **Enable app** control to enable the use of the disabled app. These actions require a *Company Administrator* administrator role.
8887

89-
- *Compliance Administrator*
90-
- *Company Administrator*
91-
- *Security Administrator*
92-
- *Security Operator*
9388

9489
## Managing Google Workspace and Salesforce OAuth apps
9590

CloudAppSecurityDocs/editions-cloud-app-security-o365.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,32 @@
11
---
2-
title: Differences between Defender for Cloud Apps and Microsoft 365 Cloud App Security
3-
description: This article describes the differences between Defender for Cloud Apps and Microsoft 365 Cloud App Security.
4-
ms.date: 05/19/2024
2+
title: Differences between Defender for Cloud Apps and Office 365 Cloud App Security
3+
description: This article describes the differences between Defender for Cloud Apps and Office 365 Cloud App Security.
4+
ms.date: 11/18/2024
55
ms.topic: overview
66
---
7-
# Compare Microsoft Defender for Cloud Apps and Microsoft 365 Cloud App Security
7+
# Compare Microsoft Defender for Cloud Apps and Office 365 Cloud App Security
88

9-
This article describes the differences between Defender for Cloud Apps and Microsoft 365 Cloud App Security.
9+
This article describes the differences between Defender for Cloud Apps and Office 365 Cloud App Security.
1010

11-
Both Microsoft Defender for Cloud Apps and Microsoft 365 Cloud App Security are accessed through the Microsoft Defender portal. Depending on your license, you'll either have access to Microsoft 365 Cloud App Security only or the entire Defender for Cloud Apps solution.
11+
Both Microsoft Defender for Cloud Apps and Office 365 Cloud App Security are accessed through the Microsoft Defender portal. Depending on your license, you'll either have access to Office 365 Cloud App Security only or the entire Defender for Cloud Apps solution.
1212

13-
For more information, see the [Microsoft 365 licensing datasheet](https://aka.ms/M365EnterprisePlans).
13+
For more information, see the [Office 365 licensing datasheet](https://aka.ms/M365EnterprisePlans).
1414

1515
## Microsoft Defender for Cloud Apps
1616

1717
Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps. With this service, you can gain visibility into Shadow IT by discovering cloud apps in use. You can control and protect data in the apps once you sanction them to the service.
1818

19-
## Microsoft 365 Cloud App Security
19+
## Office 365 Cloud App Security
2020

21-
Microsoft 365 Cloud App Security is a subset of Microsoft Defender for Cloud Apps that provides enhanced visibility and control for Microsoft 365.
21+
Office 365 Cloud App Security is a subset of Microsoft Defender for Cloud Apps that provides enhanced visibility and control for Office 365.
2222

23-
Microsoft 365 Cloud App Security includes threat detection based on user activity logs, discovery of Shadow IT for apps that have similar functionality to Microsoft 365 offerings, control app permissions to Microsoft 365, and apply access and session controls. Microsoft 365 Cloud App Security has access to all of the features of Microsoft Defender for Cloud Apps, but supports only the Microsoft 365 app connector.
23+
Office 365 Cloud App Security includes threat detection based on user activity logs, discovery of Shadow IT for apps that have similar functionality to Office 365 offerings, control app permissions to Office 365, and apply access and session controls. Office 365 Cloud App Security has access to all of the features of Microsoft Defender for Cloud Apps, but supports only the Office 365 app connector.
2424

2525
### Feature support
2626

27-
|Capability|Feature|Microsoft Defender for Cloud Apps|Microsoft 365 Cloud App Security|
27+
|Capability|Feature|Microsoft Defender for Cloud Apps|Office 365 Cloud App Security|
2828
|----|----|----|----|
29-
|Cloud discovery|Discovered apps |31,000 + cloud apps |750+ cloud apps with similar functionality to Microsoft 365|
29+
|Cloud discovery|Discovered apps |31,000 + cloud apps |750+ cloud apps with similar functionality to Office 365|
3030
||Deployment for discovery analysis|<li> Manual upload <br> <li> Automated upload - Log collector and API <br> <li> Native Defender for Endpoint integration |Manual log upload|
3131
||Log anonymization for user privacy|Yes||
3232
||Access to full cloud app catalog|Yes||
@@ -39,12 +39,12 @@ Microsoft 365 Cloud App Security includes threat detection based on user activit
3939
||Policy setting and enforcement|Yes||
4040
||Integration with Microsoft Purview |Yes||
4141
||Integration with third-party DLP solutions|Yes||
42-
|Threat Detection|Anomaly detection and behavioral analytics|For Cross-SaaS apps including Microsoft 365|For Microsoft 365 apps |
42+
|Threat Detection|Anomaly detection and behavioral analytics|For Cross-SaaS apps including Office 365|For Office 365 apps |
4343
||Manual and automatic alert remediation|Yes|Yes|
44-
||SIEM connector|Yes. Alerts and activity logs for cross-SaaS apps.|For Microsoft 365 alerts only|
44+
||SIEM connector|Yes. Alerts and activity logs for cross-SaaS apps.|For Office 365 alerts only|
4545
||Integration to Microsoft Intelligent Security Graph|Yes|Yes|
4646
||Activity policies|Yes|Yes|
47-
|Conditional access app control|Real-time session monitoring and control|Any cloud and on-premises app|For Microsoft 365 apps|
47+
|Conditional access app control|Real-time session monitoring and control|Any cloud and on-premises app|For Office 365 apps|
4848
|Cloud Platform Security|Security configurations|For Azure, AWS, and GCP|For Azure|
4949

5050
## Next steps

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,4 +30,7 @@ Microsoft Entra ID supports both browser-based and non browser-based policies. W
3030

3131
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
3232

33-
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
33+
Note: The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
34+
Please ensure the CA policy does not restrict access to this application in the **Target resources**.
35+
36+
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
263 KB
Loading

0 commit comments

Comments
 (0)